The Electronic Journal of Information Systems Evaluation provides critical perspectives on topics relevant to Information Systems Evaluation, with an emphasis on the organisational and management implications

Abstract

Abstract: COBIT, (Control Objectives for Information and Information related Technologies) as an IT governance framework is well‑known in IS practitioners communities. It would impair the virtues of COBIT to present it only as an IT governance framework
. COBIT analyses the complete IS function and offers descriptive and normative support to manage, govern and audit IT in organizations. Although the framework is well accepted in a broad range of IS communities, it is created by practitioners and therefor
e it holds only a minor amount of theoretical supported claims. Thus critic rises from the academic community. This work contains research focusing on the theoretical fundamentals of the ISACA framework, COBIT 5 released in 2012. We implemented a reverse
engineering work and tried to elucidate as much as possible propositions from COBIT 5 as an empiricism. We followed a qualitative research method to develop inductively derived theoretical statements. However our approach differs from the original work on
grounded theory by Glaser and Strauss (1967) since we started from a general idea where to begin and we made conceptual descriptions of the empirical statements. So our data was only restructured to reveal theoretical findings. We looked at three candi
date theories: 1) Stakeholder Theory (SHT), 2) Principal Agent Theory (PAT), and 3) Technology Acceptance Model (TAM). These three theories are categorized and from each theory, several testable propositions were deduced. We considered the five
COBIT 5 principles, five processes (APO13, BAI06, DSS05, MEA03 and EDM03) mainly situated in the area of IS security and four IT‑related goals (IT01, IT07, IT10 and IT16). The choice of the processes and IT‑related goals are based on an experienced k
nowledge of COBIT as well of the theories. We constructed a mapping table to find matching patterns. The mapping was done separately by several individuals to increase the internal validity. Our findings indicate that COBIT 5 holds theoretical supported c
laims. The lower theory types such as PAT and SHT contribute

Abstract

Abstract: COBIT, (Control Objectives for Information and Information related Technologies) as an IT governance framework is well‑known in IS practitioners communities. It would impair the virtues of COBIT to present it only as an IT governance framework
. COBIT analyses the complete IS function and offers descriptive and normative support to manage, govern and audit IT in organizations. Although the framework is well accepted in a broad range of IS communities, it is created by practitioners and therefor
e it holds only a minor amount of theoretical supported claims. Thus critic rises from the academic community. This work contains research focusing on the theoretical fundamentals of the ISACA framework, COBIT 5 released in 2012. We implemented a reverse
engineering work and tried to elucidate as much as possible propositions from COBIT 5 as an empiricism. We followed a qualitative research method to develop inductively derived theoretical statements. However our approach differs from the original work on
grounded theory by Glaser and Strauss (1967) since we started from a general idea where to begin and we made conceptual descriptions of the empirical statements. So our data was only restructured to reveal theoretical findings. We looked at three candi
date theories: 1) Stakeholder Theory (SHT), 2) Principal Agent Theory (PAT), and 3) Technology Acceptance Model (TAM). These three theories are categorized and from each theory, several testable propositions were deduced. We considered the five
COBIT 5 principles, five processes (APO13, BAI06, DSS05, MEA03 and EDM03) mainly situated in the area of IS security and four IT‑related goals (IT01, IT07, IT10 and IT16). The choice of the processes and IT‑related goals are based on an experienced k
nowledge of COBIT as well of the theories. We constructed a mapping table to find matching patterns. The mapping was done separately by several individuals to increase the internal validity. Our findings indicate that COBIT 5 holds theoretical supported c
laims. The lower theory types such as PAT and SHT contribute the most. The presence and contribution of a theory is significantly constituted by IT‑related goals as compared to the processes. We also make some suggestions for further research. First of al
l, the work has to be extended to all COBIT 5 processes and IT‑related goals. This effort is currently going on. Next we ponder the question what other theories could be considered as candidates for this theoretical reverse engineering labour? During our
work we listed already some theories with good potential. Our used pattern matching process can also be refined by bringing in other assessment models. Finally an alternative and more theoretic framework could be designed by using design science research
methods and starting with the most relevant IS theories. That could lead to a new IT artefact that eventually could be reconciled with COBIT 5.

Abstract

Abstract: While traditional Business Intelligence (BI) environments have for some time assisted organizations with their information requirements, they have become increasingly incompatible with the pressures of current business environments. They are g
eared towards analysis of historical information, and limited in their ability to close the latency gap between information and action. This has encouraged a movement towards real‑time BI (RTBI) systems. Although these overcome latency aspects of tradit
ional BI, and offer many value‑adding benefits to organizations, their implementation has been hampered by technological complexities, and has required changes to the business environment, and high costs to put them in place. Justification of such IT inve
stments remains a problem as they provide many intangible benefits incompatible with traditional (financial) IT benefits measurement models. For these reasons, the research set out to investigate and understand the technological components and organizat
ional changes surrounding RTBI implementation. To further facilitate justification, application areas and benefits of RTBI were also explored. Data was collected through semi‑structured in‑depth interviews in organizations across several industries that h
ad implemented or were implementing RTBI systems. A qualitative thematic analysis was then used to investigate the issues further. The study confirmed that RTBI is likely to require major changes to technical architecture, which may involve acquisition of
new tools and technologies. Several issues at the organisational level also need to be addressed, and the research uncovered a wide range of practical RTBI applications and analytics applied across industries; process intelligence was found to play a fun
damental role in many of these. The study reveals that RTBI can offer significant and measurable improvements, help organizations remain competitive, and in the long run, drive strategic business objectives from a grass roots level. To assist organisation
s to take advantage of this, a roadmap for RTBI justification and implementation planning is suggested.

Abstract

Abstract: ERP systems are today implemented in a great number of organizations. Research has invested much energy and time to make descriptions and recommendations regarding how the implementation should best be managed. The next step in practice as well
as in research is how to continue to develop the business processes and ERP systems in order to take advantage of all their promises, and to refine how ERP systems are used in day‑to‑day activities. A starting point for the present study is that organizat
ions today are characterized by strong external and internal pressure. In order to response to and deal with these, organizations strive to balance demands regarding stability and change. This implies that organizations put effort into designing and maint
aining or changing practices, rules and routines. Within the general fields of organization theory and management accounting/control the ambition to create deliberate change is often conceptualized as processes of organizational learning (OL). This conc
ept has also been used in the context of ERP systems. The research field is however heterogeneous and findings are scattered and inconsistent. There is a need for further development of our knowledge about the role of ERP systems in processes of organizat
ional learning after the implementation phase. The present paper strives to consolidate and synthesize the current knowledge. The research question is to what extent and how do research conceptualize organizational learning and its interactions and involv
ement with the ERP system? The paper is a literature review of research on OL in the context of ERP systems in the post‑implementation phase between the years 2005‑2015. A total number of 18 research articles were identified. The aim is to analyze and cla
ssify previous research, and also to give suggestions for avenues suitable and fruitful for future research. The review compares and contrasts approaches in order to analyze similarities and dissimilarities and to investigate what topics or issues have be
en addressed by previous research. The analysis shows that overall there is a lack of definitions and stringency in research on OL in an ERP systems context in the post‑implementation phase. The final section also forwards some suggestions for future rese
arch.

Abstract

Abstract: This study forms part of a larger research project to explore and analyze the perceived value of IT and the organizational competencies needed to deliver that value. By identifying and evaluating the challenges faced by Lebanese organizations, t
his paper provides empirical evidence in support of hybrid models of IT value. While process‑based IT value models provide an explanation for how IT value is created, and what steps occur to create that outcome, they lack the contingency theory found in
variance models, which explain why IT value is realized, and what variable moderate that outcome. On the other hand, variance models alone are also ill‑equipped to explain the greater scope and impacts of IT investments. Hybrid models combine both proc
ess and variance perspectives to provide a more comprehensive theory of IT value realization. Structured interviews are conducted with the Chief Information Officers (CIO) of 36 medium and large size Lebanese organizations to discover the challenges fa
ced in delivering value from IT investments. Of the 14 challenges discovered, seven point to the need for process orientated competencies and these include Change Management, Organizational Readiness, Relationship Management, Benefits Management,
IT Governance, IT Architecture Management, and IT Talent Management. The other seven challenges are variance oriented and point to the factors that inhibit or enable deriving IT value, and these include internal factors, such as: Family Business O
wnership, and Budgetary Constraints, and other external factors, such as: Political/Social/Economic Instability, Telecommunications/Bandwidth Issues, Lack of Governmental IT Laws, Local Cultural Issues, and Immature Local Suppliers/Vendors. R
ather than continuing an already‑saturated research conversation about the dependent variable, IT Value and whether IT creates business value, this study contributes to the independent variable research stream ‑ the investigation of how to derive value
from IT, and when and under which conditions value is realized, and for conceiving a Hybrid model explaining the IT value proposition.

Abstract

Abstract: Tactical Management is a distinctive managerial function that needs to be delineated both in the managerial and information systems sense. This research of literature investigates current types of managerial information systems in order to evalu
ate the various manners tactical management is addressed. Ongoing research supports us to pursue a goal of properly defining Tactical Management, its characteristics and distinctiveness from the Operational, Strategic and Project Management; but also its
connection points and overlapping collaboration areas with these managerial functions. This ought to provide proper basis for recognizing the information system requirements for tactical management and shed light on what should and can be done differently
, in order to align the tactical management business profile and needs with the information provisioned by managerial information systems. Given that Tactical Management needs adaptability to changing context (organizational and environmental); is faci
ng the complexity of issues of different nature to be dealt with; communicates with widest scope of stakeholders, entities, processes and developments to be informed about; faces a variable set of diverse incoming and outgoing information flows whose mism
atch needs to be addressed; and last but not least, should be able to perform system design, prior process design and management. This research reaches several important findings in the direction of under‑addressing of tactical information needs by curren
t types of managerial information systems; ingestion or assimilation of the tactical managerial level of decision‑making by operational or strategic management; attempts to automatize the handling of mismatch of incoming and outgoing information; strive f
or real‑time information environments; divided tendencies towards providing adaptability or predictability to the management; diverse ideas for context capturing and treatments of tactical management as process or system. The implicit purpose of the resea
rch is to attract attention to tactical management, its importance that can bring substantial competitive advantage to the businesses, and the incremental potential tactical management will realize when being accordingly supported by the information syste
ms of tomorrow.

Abstract

Abstract: This paper deals with the issues of Russian and international researches in the field of design of sustainable information architecture of management systems in the context of spatial economics. It is theoretical and empirical research in equal
measure. Research methodology is methods and procedures of modeling. The main purpose of this paper is consideration the features of application of contemporary intelligent information technologies and systems for spatiotemporal analysis. The paper is dev
oted to the study of issues of stability of architecture of spatial information system. Now modern intelligent methods and technologies are essential components for developing management decision process that will enable companies to succeed in a rapidly
changing environment. The latest achievements in the field of intelligent technologies in economy and management, including the methods and tools of agent‑based modeling and soft computing are the key factors in improving organizational performance and in
creasing its competitiveness. Fuzzy technologies as technologies of artificial intelligence are having a significant influence on information systems (IS) design and analysis. At the same time IS sustainability is now one of the key drivers of business
success. Original contribution of the work is based on the applying of intelligent information technologies and modern modeling methods for creating scoring model of IS sustainability. The paper also contains theoretical foundations of information systems
architecture and the brief overview of spatial sciences development in Russia.

Abstract

Abstract: Organizations are now increasingly expected to address the sustainability of their information technology (IT) and communication infrastructure. This research investigates the antecedents for the adoption of Green IT in South African higher ed
ucation institutions (HEI), namely which drivers and readiness factors influence Green IT adoption. Green IT comprises of server virtualization, storage virtualization, storage consolidation, environment‑friendly IT procurement, electronic waste managem
ent policies and measuring the environmental impact of IT. For the purpose of this research, Green IT drivers were classified into economic, ethical, response and regulatory drivers as per Mollas (2008) Green IT model. Additionally, we also investigate
d the role of the following Green IT readiness factors: institutional, organisational and value network Green IT. IT managers at all South Africas HEIs were approached through an online survey. Given the small number of HEIs in South Africa, sample size
was necessarily limited but the responses received represent a significant and representative portion of the South African HEIs and encouraging results were found. All Green IT drivers were found to be significant antecedents in the adoption of green IT,
although the overall adoption of green IT is relatively low. However, most HEI stakeholders in the HEI value network, i.e. suppliers, investors, competitors and government, do not seem to exert a significant influence on green IT adoption. We condensed th
ese antecedents into a revised Green IT adoption model. Our research instrument and proposed resultant Green IT model should be of interest, not only to HEI stakeholder in South Africa and elsewhere in the world, but also to researchers in the field of su
stainability of information technologies and the manufacturers of green and sustainable technologies. ( %FIRSTNAME% %LASTNAME%: I have added this in due to the mention in the conclusion that Economic Drivers seem to be one of the main deciding factors. T
his would be of interest to manufacturers of the technology for marketing purposes.)